2010
DOI: 10.1007/978-3-642-14478-3_42
|View full text |Cite
|
Sign up to set email alerts
|

Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
112
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 200 publications
(112 citation statements)
references
References 6 publications
0
112
0
Order By: Relevance
“…Although the literature on security-related topics related to the IoT environment is still in its infancy, there is a substantial body of work that investigates the security considerations that are critical fulfilling the security requirement in IoT applications [2,4,12,22,33,37]. Most of research has agreed that all common aspects of information security requirements (e.g., CIA triad) must be considered from the initial stage of IoT system design and development.…”
Section: Security Requirements For Iot Servicementioning
confidence: 99%
“…Although the literature on security-related topics related to the IoT environment is still in its infancy, there is a substantial body of work that investigates the security considerations that are critical fulfilling the security requirement in IoT applications [2,4,12,22,33,37]. Most of research has agreed that all common aspects of information security requirements (e.g., CIA triad) must be considered from the initial stage of IoT system design and development.…”
Section: Security Requirements For Iot Servicementioning
confidence: 99%
“…They identified the main challenges for such systems: adaptation according to the profile of the patient; requirements of quality of service and reliability; issues of privacy, security, and authentication; mobility and low energy consumption; and integration with web services. Babar et al [11] give an overview, analysis, and taxonomy of security and privacy challenges in IoT and propose the Security Model for the IoT. Venckauskas et al [12] present the energy efficient SSL protocol that ensures the maximum bandwidth and the required level of security with minimum energy consumption.…”
Section: Related Workmentioning
confidence: 99%
“…The evaluation of trust on the basis of TRM systems, facilitates to make a rational decision about selection of an agent to an interaction, especially when agents which could act selfishly or maliciously are present. Because of that TRM systems could lead to risk reduction in interactions between autonomous agents [1]. The idea behind trust and reputation management systems gets significance because of the fact that conventional security measures (based on cryptography) are often not sufficient [2], [3], [4].…”
Section: Introductionmentioning
confidence: 99%